Blogs

Search

Latest Blogs

Microexpert Guide - Cryptographic Algorithm and Key Size P2

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This is one of those subjects that you could argue everyday but the basics are actually very simple. It is generally agreed that the strength of a cryptographic algorithm can be defined by the level of computational complexity necessary to break the algorithm. If the algorithm is perfect then that should be the effort required to exhaust the key. In practice this means you have to try the algorithm for every key to get a matching pair of plain texts and cipher texts, the brute force attack.

GCHQ – The stable door is open and the horse has bolted!

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

The new head of GCHQ, Robert Hannigan writing in the FT today has warned US technology companies such as Twitter, Facebook and WhatsApp are aiding terrorist organisations by providing social media messaging that may be used to promote their cause. He further goes on to add that encrypting messages which is now routinely available can add further challenges to the security services.

Founded in 1983

Microexpert has been at the forefront of cryptographic design and development since 1983, having grown organically over the last 30+ years we have consistently supported the industry in delivering the highest quality, and through continuous training and development shaped our team to deliver the best service to our clients.

©2019 Microexpert. Registered number 01755695.

Search